Sciweavers

11395 search results - page 2274 / 2279
» Beyond computer science
Sort
View
TC
2010
13 years 2 months ago
Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes
Tweakable enciphering schemes are length preserving block cipher modes of operation that provide a strong pseudo-random permutation. It has been suggested that these schemes can b...
Cuauhtemoc Mancillas-López, Debrup Chakrabo...
TNN
2010
148views Management» more  TNN 2010»
13 years 2 months ago
A fast algorithm for robust mixtures in the presence of measurement errors
Abstract--In experimental and observational sciences, detecting atypical, peculiar data from large sets of measurements has the potential of highlighting candidates of interesting ...
Jianyong Sun, Ata Kabán
BMCBI
2011
13 years 1 months ago
Phenotype Recognition with Combined Features and Random Subspace Classifier Ensemble
Background: Automated, image based high-content screening is a fundamental tool for discovery in biological science. Modern robotic fluorescence microscopes are able to capture th...
Bailing Zhang, Tuan D. Pham
INFOCOM
2011
IEEE
12 years 11 months ago
Continuous multi-dimensional top-k query processing in sensor networks
—Top-k query has long been an important topic in many fields of computer science. Efficient implementation of the top-k queries is the key for information searching. With the n...
Hongbo Jiang, Jie Cheng, Dan Wang, Chonggang Wang,...
ASE
2011
12 years 11 months ago
Alattin: mining alternative patterns for defect detection
Abstract To improve software quality, static or dynamic defect-detection tools accept programming rules as input and detect their violations in software as defects. As these progra...
Suresh Thummalapenta, Tao Xie
« Prev « First page 2274 / 2279 Last » Next »